IS 350 UMBC Test-1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A rogue access point is usually created by ________. a) the IT security department b) an evil twin c) an external attacker d) an employee

d) an employee

A change in power from 2 mW to 205 mW corresponds to approximately ________ decibels. a) 20 b) 9 c) 3 d) 10

a) 20

A security might use SNMP Set commands to ________. a) change an access point's power b) collect information to look for a rogue access point c) both change an access point's power and collect information to look for a rogue access point d) neither change an access point's power nor collect information to look for a rogue access point

a) change an access point's power

A change in power from 100 W to 1 W corresponds to approximately ________ decibels. a) -10 b) -20 c) 20 d) 10

b) -20

A Bluetooth profile for sending a command from a wireless light switch to a lamp is probably a ________ profile. a) classic Bluetooth b) Bluetooth LE c) both classic Bluetooth and Bluetooth LE d) neither classic Bluetooth nor Bluetooth LE

b) Bluetooth LE (Low Energy)

A group of devices on a desk that communicate wirelessly is called a ________. a) LAN b) PAN c) MAN d) WAN

b) PAN Personal Are Network

A security might use SNMP Get commands to ________. a) change an access point's power b) collect information to look for a rogue access point c) both change an access point's power and collect information to look for a rogue access point d) neither change an access point's power nor collect information to look for a rogue access point

b) collect information to look for a rogue access point

802.11i 802.1X initial authentication mode was created for ________. a) residences with less than eight access points b) corporations with multiple access points c) corporations with less than eight access points d) residences with a single access point

b) corporations with multiple access points

A VPN provides ________. a) link security b) end-to-end security c) comprehensive security d) None of these

b) end-to-end security

802.11i PSK initial authentication mode was created for ________. a) corporations with multiple access points b) residences with a single access point c) residences with less than eight access points d) corporations with less than eight access points

b) residences with a single access point

802.11i provides ________. a) confidentiality b) message integrity c) both confidentiality and message integrity d) neither confidentiality nor message integrity

c) both confidentiality and message integrity

A ________ is an unauthorized internal access point. a) binky b) shadow c) rogue d) None of these

c) rogue


संबंधित स्टडी सेट्स

Measurement in Kinesiology (KIN 250) Exam #2

View Set

HESI Case Study: Benign Prostatic Hyperplasia

View Set

Biology Chapter 3: Ecology Study Guide

View Set

UNIT 14. SOFTWARE ENGINEERING. Vocabulary bank

View Set